Blog

The blog posts give you an in-depth understanding of Torizon, its advantages, use cases, the latest updates, and developments.


Torizon OS
April 25, 2024

Migration to Torizon from Third-party Solutions with an example of Foundries.io

Torizon OS is an open-source, industrial, embedded Linux distribution with no vendor lock-in. Whether you seek community support or assistance from Toradex, transitioning from other providers like Foundries.io is seamless.

Torizon Cloud
November 13, 2023

Accelerate Software Development with Torizon Cloud

To many developers it is not clear how they can leverage Torizon Cloud in the development phase of a project. In this article we offer insights into how some of our customers are leveraging Torizon Cloud to make development both more efficient and more fun.

Secure offline updates
November 9, 2023

Problem solved: Secure offline updates for embedded Linux devices

Torizon makes offline updates of embedded devices simple, safe, and reliable. In part two of our blog series on secure offline updates, we explore why it matters and how it works. Torizon’s secure offline update service for embedded Linux devices was developed from the ground up to de-risk software updates and make them hassle-free.

Machine Learning
October 20, 2023

Machine Learning - How to migrate from Raspberry Pi

Developing Machine Learning applications often raises several questions. Edge Impulse provides a platform that simplifies ML application development at the edge. In this blog post, you will see how to build a classification model that distinguishes between three distinct objects.

Secure offline updates
October 10, 2023

Secure offline updates: Why conventional approaches fall short

Online update capability is establishing itself as the gold standard for state-of-the-art devices, for several reasons. The ability to issue updates from a centralized location reduces maintenance efforts (and CO2 emissions) associated with dispatching technicians to remote locations.

Linux Containers
December 13, 2022

Performance Impact of Docker Containers on Linux

In this article, we will explore some of the variables, and highlight some common mistakes and the best practices for creating and developing your containers with performance in mind. The goal here is not to show if the same-performance premise actually reflects real-life applications, but instead to show how you can get the most out of your container to make the Docker overhead virtually nonexistent. Lastly, we will also showcase some possible issues that may arise when starting multiple containers at once and how all of this affects memory and boot time.

Linux Mainline
November 21, 2022

Upstream First - Toradex Mainline Kernel Support is a Reality

The quality of our hardware and software is well known, and we are committed to open-source initiatives in most projects across our product line. We are an active contributor to the Linux kernel in particular and, in keeping with this, recently changed our strategy to commit everything possible to the mainline Linux kernel — we are now enthusiastically "Upstream First."

Flash Analytics Tool
September 6, 2022

Flash Health Monitoring on Torizon

Hey there, Leo here! Some years ago, I worked on an innovation project - by now archived - named Flash Analytics Tool. One of the project goals was to research and apply methods to estimate flash memory lifespan on Embedded Linux - more specifically, using Torizon in its early days - thus helping our customers develop flash-friendly applications and get an estimate of how long they could expect their devices to withstand in the field.

IoT Security
March 16, 2022

IoT Security Blog Series Part 3
Software update security: Common mistakes

This is part 3 of our 7-part series about over-the-air software updates. In part 1, we told you about all the reasons it’s important to be able to deliver software updates remotely, and in part 2 we wrote about all the reasons software update systems are dangerous. Today, we’re looking at ways to protect your software update system that might seem secure at first glance, but aren't—with famous real-world failures for each example.

Flutter UI Development
March 10, 2022

Flutter on Torizon - A PoC Setup for i.MX 8M Plus

For some time already, Flutter has been quite successful as a native HMI and Application technology on the Web, Mobile Phones, and even for Desktop. Developers love the programming language, its performance, and the outstanding feature richness (e.g., the ability to create performant and custom animations of any complexity). It is extensively used by Google internally. Moreover, with its attractive BSD license, it has been used by many independent software development vendors meanwhile.

A case study by RND Group

When project managers hear a project involves writing embedded software there is an expectation that a software developer with very specialized skills will be required to work on the project. Embedded software development historically requires a developer with both an electrical engineering and computer science background, writing software and firmware in a low-level language like C or C++, acquiring expensive software development tools, and typically the developed user interface will be rudimentary by modern GUI standards.

IoT Security
February 10, 2022

IoT Security Blog Series Part 2:
The dangers of remote updates

This is part 2 of our 7-part series about over-the-air software updates. In part 1, we told you about all the reasons it’s important to be able to deliver software updates remotely - in today’s world, you can’t keep any connected device secure unless you can update it. Today’s post, though, goes in the opposite direction: we’re going to look at why software update systems can be incredibly dangerous, and why you should treat them with skepticism and caution.

IoT Security
January 18, 2022

IoT Security Blog Series Part 1:
Why do we need remote updates for connected devices?

With the explosion of internet-connected devices in recent years, there has been an industry-wide realization of the need to keep these devices updated throughout their lifetime. This is the first part of a series that will explore the concept of remote over-the-air (OTA) updates, providing designers details they will need when implementing remote OTA update solutions into their systems. We will especially focus on the important security aspects. We’ll start with the basics.

?Have a Question ?